{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:56:27Z","timestamp":1770065787603,"version":"3.49.0"},"publisher-location":"New York, New York, USA","reference-count":42,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Research Council","award":["ERC-2012-StG-308246"],"award-info":[{"award-number":["ERC-2012-StG-308246"]}]},{"name":"National Science Foundation","award":["CCF-1320563"],"award-info":[{"award-number":["CCF-1320563"]}]},{"name":"Amazon Web Services (AWS) Educaiton Grant"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1145\/2663165.2663334","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T15:45:24Z","timestamp":1417016724000},"page":"61-72","source":"Crossref","is-referenced-by-count":36,"title":["Slider"],"prefix":"10.1145","author":[{"given":"Pramod","family":"Bhatotia","sequence":"first","affiliation":[]},{"given":"Umut A.","family":"Acar","sequence":"additional","affiliation":[]},{"given":"Flavio P.","family":"Junqueira","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2663165.2663334-1","unstructured":"Apache Hadoop: http:\/\/hadoop.apache.org."},{"key":"key-10.1145\/2663165.2663334-2","unstructured":"Apache PigMix: http:\/\/wiki.apache.org\/pig\/PigMix."},{"key":"key-10.1145\/2663165.2663334-3","unstructured":"Apache S4: http:\/\/incubator.apache.org\/s4."},{"key":"key-10.1145\/2663165.2663334-4","unstructured":"Asymptotic analysis of self-adjusting contraction trees: http:\/\/www.mpi-sws.org\/~bhatotia\/publications."},{"key":"key-10.1145\/2663165.2663334-5","unstructured":"Storm: http:\/\/storm-project.net."},{"key":"key-10.1145\/2663165.2663334-6","unstructured":"Trident: http:\/\/storm.incubator.apache.org\/."},{"key":"key-10.1145\/2663165.2663334-7","unstructured":"Wikipedia dataset: http:\/\/wiki.dbpedia.org."},{"key":"key-10.1145\/2663165.2663334-8","unstructured":"U. A. Acar.Self-Adjusting Computation. PhD thesis, Carnegie Mellon University, 2005."},{"key":"key-10.1145\/2663165.2663334-9","doi-asserted-by":"crossref","unstructured":"U. A. Acar, G. E. Blelloch, M. Blume, R. Harper, and K. Tangwongsan. An experimental analysis of self-adjusting computation.ACM TOPLAS, 2009.","DOI":"10.1145\/1596527.1596530"},{"key":"key-10.1145\/2663165.2663334-10","doi-asserted-by":"crossref","unstructured":"U. A. Acar, G. E. Blelloch, and R. D. Blumofe. The Data Locality of Work Stealing. InSPAA, 2000.","DOI":"10.1145\/341800.341801"},{"key":"key-10.1145\/2663165.2663334-11","doi-asserted-by":"crossref","unstructured":"U. A. Acar, G. E. Blelloch, R. Ley-Wild, K. Tangwongsan, and D. T&#252;rko&#287;lu. Traceable data types for self-adjusting computation. InACM PLDI, 2010.","DOI":"10.1145\/1806596.1806650"},{"key":"key-10.1145\/2663165.2663334-12","unstructured":"P. Aditya, M. Zhao, Y. Lin, A. Haeberlen, P. Druschel, B. Maggs, and B. Wishon. Reliable Client Accounting for P2P-Infrastructure Hybrids. InNSDI, 2012."},{"key":"key-10.1145\/2663165.2663334-13","unstructured":"G. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Shenker, and I. Stoica. PACMan: Coordinated Memory Caching for Parallel Jobs. InNSDI, 2012."},{"key":"key-10.1145\/2663165.2663334-14","doi-asserted-by":"crossref","unstructured":"Ananthanarayanan et al. Photon: Fault-tolerant and Scalable Joining of Continuous Data Streams. InSIGMOD, 2013.","DOI":"10.1145\/2463676.2465272"},{"key":"key-10.1145\/2663165.2663334-15","doi-asserted-by":"crossref","unstructured":"M. Balazinska, H. Balakrishnan, S. Madden, and M. Stonebraker. Fault-Tolerance in the Borealis Distributed Stream Processing System. InSIGMOD, 2005.","DOI":"10.1145\/1066157.1066160"},{"key":"key-10.1145\/2663165.2663334-16","unstructured":"P. Bhatotia, R. Rodrigues, and A. Verma. Shredder: GPU-Accelerated Incremental Storage and Computation. InFAST, 2012."},{"key":"key-10.1145\/2663165.2663334-17","unstructured":"P. Bhatotia, A. Wieder, I. E. Akkus, R. Rodrigues, and U. A. Acar. Large-scale incremental data processing with change propagation. InHotCloud, 2011."},{"key":"key-10.1145\/2663165.2663334-18","doi-asserted-by":"crossref","unstructured":"P. Bhatotia, A. Wieder, R. Rodrigues, U. A. Acar, and R. Pasquini. Incoop: MapReduce for Incremental Computations. InSoCC, 2011.","DOI":"10.1145\/2038916.2038923"},{"key":"key-10.1145\/2663165.2663334-19","doi-asserted-by":"crossref","unstructured":"Y. Bu, B. Howe, M. Balazinska, and M. D. Ernst. HaLoop: Efficient Iterative Data Processing on Large Clusters. InVLDB, 2010.","DOI":"10.14778\/1920841.1920881"},{"key":"key-10.1145\/2663165.2663334-20","doi-asserted-by":"crossref","unstructured":"C. Olston et al. Pig Latin: A Not-So-Foreign Language for Data Processing. InSIGMOD, 2008.","DOI":"10.1145\/1376616.1376726"},{"key":"key-10.1145\/2663165.2663334-21","doi-asserted-by":"crossref","unstructured":"C. Olston et al. Nova: Continuous Pig\/Hadoop Workflows. InSIGMOD, 2011.","DOI":"10.1145\/1989323.1989439"},{"key":"key-10.1145\/2663165.2663334-22","doi-asserted-by":"crossref","unstructured":"Y.-J. Chiang and R. Tamassia. Dynamic algorithms in computational geometry.Proceedings of the IEEE, 1992.","DOI":"10.1109\/5.163409"},{"key":"key-10.1145\/2663165.2663334-23","unstructured":"T. Condie, N. Conway, P. Alvaro, J. M. Hellerstein, K. Elmeleegy, and R. Sears. MapReduce Online. InNSDI, 2010."},{"key":"key-10.1145\/2663165.2663334-24","unstructured":"J. Dean and S. Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. InOSDI, 2004."},{"key":"key-10.1145\/2663165.2663334-25","unstructured":"C. Demetrescu, I. Finocchi, and G. Italiano.Handbook on Data Structures and Applications."},{"key":"key-10.1145\/2663165.2663334-26","unstructured":"M. Dischinger, M. Marcon, S. Guha, K. P. Gummadi, R. Mahajan, and S. Saroiu. Glasnost: Enabling End Users to Detect Traffic Differentiation. InNSDI, 2010."},{"key":"key-10.1145\/2663165.2663334-27","unstructured":"P. K. Gunda, L. Ravindranath, C. A. Thekkath, Y. Yu, and L. Zhuang. Nectar: Automatic Management of Data and Computation in Datacenters. InOSDI, 2010."},{"key":"key-10.1145\/2663165.2663334-28","doi-asserted-by":"crossref","unstructured":"B. He, M. Yang, Z. Guo, R. Chen, B. Su, W. Lin, and L. Zhou. Comet: Batched Stream Processing for Data Intensive Distributed Computing. InSoCC, 2010.","DOI":"10.1145\/1807128.1807139"},{"key":"key-10.1145\/2663165.2663334-29","doi-asserted-by":"crossref","unstructured":"M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly. Dryad: Distributed Data-Parallel Programs from Sequential Building Blocks. InEuroSys, 2007.","DOI":"10.1145\/1272996.1273005"},{"key":"key-10.1145\/2663165.2663334-30","doi-asserted-by":"crossref","unstructured":"D. Logothetis, C. Olston, B. Reed, K. Web, and K. Yocum. Stateful bulk processing for incremental analytics. InSoCC, 2010.","DOI":"10.1145\/1807128.1807138"},{"key":"key-10.1145\/2663165.2663334-31","doi-asserted-by":"crossref","unstructured":"M. Ali et al. Microsoft CEP server and online behavioral targeting. InVLDB, 2009.","DOI":"10.14778\/1687553.1687590"},{"key":"key-10.1145\/2663165.2663334-32","unstructured":"M. Zaharia et al. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. InNSDI, 2012."},{"key":"key-10.1145\/2663165.2663334-33","doi-asserted-by":"crossref","unstructured":"D. G. Murray, F. McSherry, R. Isaacs, M. Isard, P. Barham, and M. Abadi. Naiad: A Timely Dataflow System. InSOSP, 2013.","DOI":"10.1145\/2517349.2522738"},{"key":"key-10.1145\/2663165.2663334-34","unstructured":"D. Peng and F. Dabek. Large-scale Incremental Processing Using Distributed Transactions and Notifications. InOSDI, 2010."},{"key":"key-10.1145\/2663165.2663334-35","unstructured":"L. Popa, M. Budiu, Y. Yu, and M. Isard. DryadInc: Reusing work in large-scale computations. InHotCloud, 2009."},{"key":"key-10.1145\/2663165.2663334-36","doi-asserted-by":"crossref","unstructured":"W. Pugh. Skip Lists: A Probabilistic Alternative to Balanced Trees. InCACM, 1990.","DOI":"10.1007\/3-540-51542-9_36"},{"key":"key-10.1145\/2663165.2663334-37","doi-asserted-by":"crossref","unstructured":"G. Ramalingam and T. Reps. A Categorized Bibliography on Incremental Computation. InPOPL, 1993.","DOI":"10.1145\/158511.158710"},{"key":"key-10.1145\/2663165.2663334-38","doi-asserted-by":"crossref","unstructured":"T. Rodrigues, F. Benevenuto, M. Cha, K. Gummadi, and V. Almeida. On Word-of-Mouth Based Discovery of the Web. InIMC, 2011.","DOI":"10.1145\/2068816.2068852"},{"key":"key-10.1145\/2663165.2663334-39","doi-asserted-by":"crossref","unstructured":"M. A. Shah, J. M. Hellerstein, and E. Brewer. Highly available, fault-tolerant, parallel dataflows. InSIGMOD, 2004.","DOI":"10.1145\/1007568.1007662"},{"key":"key-10.1145\/2663165.2663334-40","doi-asserted-by":"crossref","unstructured":"Z. Qian et al. TimeStream: Reliable Stream Computation in the Cloud. InEuroSys, 2013.","DOI":"10.1145\/2465351.2465353"},{"key":"key-10.1145\/2663165.2663334-41","doi-asserted-by":"crossref","unstructured":"M. Zaharia, T. Das, H. Li, T. Hunter, S. Shenker, and I. Stoica. Discretized Streams: Fault-Tolerant Streaming Computation at Scale. InSOSP, 2013.","DOI":"10.1145\/2517349.2522737"},{"key":"key-10.1145\/2663165.2663334-42","unstructured":"M. Zaharia, A. Konwinski, A. D. Joseph, R. Katz, and I. Stoica. Improving MapReduce Performance in Heterogeneous Environments. InOSDI, 2008."}],"event":{"name":"the 15th International Middleware Conference","location":"Bordeaux, France","acronym":"Middleware '14","number":"15","sponsor":["Raytheon BBN Technologies","IFIP","Conseil R\u00e9gional d'Aquitaine","USENIX","ACM, Association for Computing Machinery","LaBRI","HP","Bordeaux, City of Bordeaux","GDR ASR, GDR Architecture, Syst\u00e8mes et R\u00e9seaux"],"start":{"date-parts":[[2014,12,8]]},"end":{"date-parts":[[2014,12,12]]}},"container-title":["Proceedings of the 15th International Middleware Conference on - Middleware '14"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663165.2663334","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2663334&amp;ftid=1515750&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:46Z","timestamp":1750227226000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2663165.2663334"}},"subtitle":["incremental sliding window analytics"],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1145\/2663165.2663334","relation":{},"subject":[],"published":{"date-parts":[[2014]]}}}